Kaspersky Lab, a leading developer of secure content and threat management solutions, has officially been named a "Leader" in the Gartner Magic Quadrant for Endpoint Protection Platforms. In this report, Gartner analysts note that,
"Leaders demonstrate balanced progress and effort in all execution and vision categories. Their capabilities in advanced malware protection, data protection and/or management features raise the competitive bar for all products in the market, and they can change the course of the industry. A leading vendor isn't a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant. Some clients believe that Leaders are spreading their efforts too thinly and aren't pursuing clients' special needs."
It’s increasingly convenient to use credit and debit cards for online shopping, making hotel reservations, renting cars, and buying airline tickets online. This paper will discuss consumer safety and best practices when conducting online transactions. What you should do to protect yourself and avoid the pitfalls of online scams? What rules should you follow when shopping online or conducting other business with bank cards on the Internet?
Security considerations for the retailer involve the data center as well as the endpoint. From a security perspective the common theme is access to rich data. The endpoint, including the POS terminal, is often the easiest path to gain entry into a retailer’s network and data, and that’s where Payment Card Industry Data Security Standard (PCI DSS) requirements could fail. This paper focuses on endpoint security and why a comprehensive security solution is required.
The mobility of employees and company data present a growing challenge for most organizations. Keeping up with the resultant growth in corporate cybercrime is becoming more and more challenging with each passing day. As the number of mobile devices, social media sites and sheer volume of cybercriminals grows exponentially, so does the threat to organizations.
What’s worse, as a result, many IT departments have become accomplices to corporate cybercrime. This webinar discusses 10 ways that IT departments are enabling cybercriminals today, and offers ways to stop them, based on third-party research and analysis from Kaspersky Lab experts. How does your organization measure up to these all-too-common pitfalls?
It’s a war out there, a war against cybercriminals who have one goal in mind – making money by targeting a company’s endpoints. Today’s cybercriminals are perpetually after data that can be easily converted into profit or credentials that will allow them to transfer money directly from the company coffers.
In this interactive Webinar we’ll discuss the growing malware threat, how cybercriminals are targeting the endpoint, and how you can protect your endpoints from the ravages of cybercrime.
Malware protection has long been considered a commodity, with price being the ultimate deciding factor. In fact, many IT managers believe that all AV solutions are the same, regardless of price. While this mindset is understandable, it couldn’t be further from the truth.
When considering the right security solution for their business every organization must consider not only price, but the high costs associated with ineffective protection.
If you've had any recent issues with Internet security and malware, you may already be wondering if your AV software is really getting the job done. This list can help. It spotlights specific objective metrics and activities you can check to see how well your current AV software is performing. Besides helping you benchmark your current software, it also establishes a starting point for evaluating new AV options when you decide you need to make a change.
Find out how a highly successful and technologically savvy retailed turned to Kaspersky to secure their 350 locations. The company relies heavily on computing for operations, warehouse distribution, loss prevention, quality assurance, training and other essential business functions. For this retailer, protection at every level of the network is critical, from the endpoint to the cloud.
The business endpoint security market is changing at a surprisingly rapid clip, especially considering how relatively mature it is. While established brand names may provide subjective reassurance, buyers who look beyond the brands to products' quantitative capabilities may discover less-familiar options that are a better fit for their enterprises.
Costin Raiu, Head of Research & Development, Kaspersky Lab, Romania
Even if your system itself is up to date, it could be infected via zero-day vulnerabilities in third-party software. Security solutions are usually updated far more quickly than software patches are produced, and provide a much-needed layer of protection during the window of vulnerability.
It's likely that the continued evolution of rogue anti-virus programs will focus on the technologies used to bypass anti-virus detection. The number of programs will probably continue to rise, as will the number of users who fall for them.
With the appearance of botnets, criminal gangs have gained access to millions of infected computers and the number of cybercrimes committed has risen sharply. Although the majority of Internet users understand that zombie networks pose a serious threat, many do not know how or why botnets are created and maintained.
Cybercrime is here to stay: it is both a product of the Internet age and part of the overall crime landscape. So it would be unrealistic, to think in terms of ‘winning the war’. Rather, it’s about finding ways to mitigate the risk.